The ensuring the integrity of information streams under the cyberattacks action | IEEE Conference Publication | IEEE Xplore